Archive for 2011/02/10
The Van Gogh Museum in Amsterdam is famous for having the world’s largest collection of Vincent Van Gogh’s drawings and paintings. But it has another reason to draw our attention today – scammers have managed to compromise its official Facebook presencePosted: 2011/02/10 in Cybercrime, Education / Awareness
Facebook. Moving to HTTPS for all transactions protects against sidejacking and protects user’s privacy, but this also prevents inspection of network transactions for malicious content … this is potentially a very scary “blindspot” within enterprise environmentsPosted: 2011/02/10 in Education / Awareness, Network Security, Privacy / Data Protection, Stats / reports
Scientists from Oxford University have made a significant step towards an ultrafast quantum computer by successfully generating 10 billion bits of quantum entanglement in silicon for the first time — entanglement is the key ingredient that promises to make quantum computers far more powerful than conventional computing devices.
BMW has released images of their new concept called the Vidion ConnectedDrive which takes information technology integration to another levelPosted: 2011/02/10 in Education / Awareness, New Business Models, Tech Evolution
The interior of the concept aims to allow driver and passenger to equally engage and share information. The driver can view 3d navigation and alert information on an enhanced head-up display overlaid on the road ahead, similar to an augmented reality display. The benefit here is taking navigation information typically displayed on a separate screen currently and merging that into a real world view. Located below is a customizable instrument cluster which presents information in 3d and can be optimized to present information based on relevance to the current driving conditions.
London-based ‘social mobile’ manufacturer announces new range running Google’s Android software ‘ruthlessly focussed’ on users of giant social network
Starting in November 2009, covert cyberattacks were launched against several global oil, energy, and petrochemical companies. The attackers targeted proprietary operations and project-financing information on oil and gas field bids and operations. This information is highly sensitive and can make or break multibillion dollar deals in this extremely competitive industryPosted: 2011/02/10 in Cybercrime, Education / Awareness, Organized Crime
I’ve been using Google since its early days, back when Yahoo was still a good place to search. Yet switching to Bing as my default search engine has been a real pleasure. Here’s whyPosted: 2011/02/10 in Education / Awareness, Google, Stats / reports, Tech Evolution
A video by researchers Fraunhofer Institute Secure Information Technology (Fraunhofer SIT) shows the dark side to jailbreaking and how it can be used to gain access to the password keychain on a locked handsetPosted: 2011/02/10 in Education / Awareness, Privacy / Data Protection
Over the years, we’ve noted that mobile phone jammers were getting more popular in the US, even though they’re completely illegal.
It seems more likely the reliance on legitimate sources of material has more to do with ease of use than willingness to payPosted: 2011/02/10 in Education / Awareness, New Business Models, Tech Evolution
An obsession with child protection in the UK and throughout the EU is encouraging a cavalier approach to law-making, which less democratic regimes are using to justify much broader repression on any speech seen as extreme or dangerousPosted: 2011/02/10 in Blocking, Education / Awareness, Filtering, Public Policy, Tech Evolution
Google and Facebook have emerged as possible buyers of Twitter, according to the Wall Street JournalPosted: 2011/02/10 in Education / Awareness, Google, New Business Models
Employment search site RecruitIreland.com has reopened its doors following a security breach that exposed users’ names and email addressesPosted: 2011/02/10 in Cybercrime, Education / Awareness, Privacy / Data Protection
Google built a multi-billion-dollar advertising empire atop a service that does little more than copy information from other sources. And yet it chastises others when they do the copyingPosted: 2011/02/10 in Education / Awareness, Google
Aaron Barr, CEO of security firm HBGary Federal, spent a month tracking down the real identities of the hacker collective Anonymous. But when he prepared to go to the FBI, Barr and his company were viciously attacked—in part by a 16-year old girl. Leaked e-mails reveal exactly how it happened.
The situation got so bad for the security company that HBGary, the company which partially owns HBGary Federal, sent its president Penny Leavy into the Anonymous IRC chat rooms to swim with the sharks—and to beg them to leave her company alone.
Anonymous doesn’t like to let up. Barr’s Twitter account remains compromised, sprinkled with profane taunts. The HBGary websites remain down. The e-mails of three key players were leaked via BitTorrent, stuffed as they were with nondisclosure agreements, confidential documents, salary numbers, and other sensitive data that had nothing to do with Anonymous.
And they have more information—such as the e-mails of Greg Hoglund, Leavy’s husband and the operator of rootkit.org (which was also taken down by the group).
When Leavy showed up to plead her case, asking Anonymous to at least stop distributing the e-mails, the hivemind reveled in its power over Leavy and her company, resorting eventually to tough demands against Barr.
The attackers are quintessentially Anonymous: young, technically sophisticated, brash, and crassly juvenile, all at the same time. And it’s getting ever more difficult to dismiss Anonymous’ hacker activity as the harmless result of a few mask-wearing buffoons.
“The WikiLeaks Threat” outlines a plan by three private data intelligence firms, Palantir Technologies, HBGary Federal, and Berico Technologies, which were hired to effectively combat and attack WikiLeaksPosted: 2011/02/10 in Education / Awareness
Ex-WikiLeaker Claims Defectors Took Control Of Leaks From Assange: “Children shouldn’t play with guns. That was our argument for removing the submissions platform from Julian’s control”Posted: 2011/02/10 in Education / Awareness
In an excerpt of Domscheit-Berg’s upcoming book, Inside WikiLeaks, that was leaked to the document-publishing site Cryptome, an English-language version of several pages states that he and one “architect” of WikiLeaks’ submissions platform took control of WikiLeaks’ system for submitting leaks away from Assange–along with at least some portion of the leaked material that WikiLeaks had obtained–to ensure the security of the site’s sources.
Specifically, the excerpt states that Assange lied to the New Yorker about decrypting the video clip and that he refused to reimburse WikiLeaks’ staffers, including Icelandic spokesperson Kristinn Hrafnsson, who worked on the project and flew to Iraq to meet with the victims’ families.
Bing and Yahoo! Search achieved the highest success rates in January 2011. This means that for both search engines, more than 81 percent of searches executed resulted in a visit to a WebsitePosted: 2011/02/10 in Education / Awareness, Stats / reports
Out of all paid clicks to the top 500 retail sites, Amazon captured the majority of traffic, or 11.25 percent of all paid clicks for the four weeks ending Jan 29, 2011.
Most Americans are worried about privacy and viruses when using Facebook or Google, according to results of a USA TODAY/Gallup PollPosted: 2011/02/10 in Education / Awareness, Google, Privacy / Data Protection, Stats / reports
Operators such as Vodafone, Telefónica and France Telecom are privately hoping that Mr Elop will use a long-awaited strategy presentation on Friday to say that Nokia’s fledgling MeeGo smartphone operating system is capable of providing a mass market alternative to Android and Apple’s iOS platform for the iPhonePosted: 2011/02/10 in Education / Awareness, Mobile tech, New Business Models, Public Policy, Tech Evolution
The fingerprints of the adult-film industry can be found on the development of VHS and Blu-ray disc. Soon, the sector may teach us about the cloudPosted: 2011/02/10 in Education / Awareness, Tech Evolution, The Cloud
The fingerprints of the adult-film industry can be found on the development of VHS and Blu-ray disc. Soon, the sector may teach us about the cloud.
The IT market staged a healthy rebound last year, with global spending on IT products and services rising 8 percent from 2009 to more than $1.5 trillion, according to IDC’s Worldwide Black Book report out today.
Following Gawker Media’s Redesign, Network Crashes